Kali Linux

One of the most popular Linux distributions in the community of computer security experts and hackers. The main reason for this is its ability to test for unauthorized access and the provision of hacker software.

Interesting facts

Due to the nature of security audits, Kali Linux is designed to be used in a “single, root user” scenario. Many of the tools used in penetration testing require escalated privileges, and while it’s generally sound policy to only enable root privileges when necessary, in the use cases that Kali Linux is aimed at, this approach would be a burden.